quantum computing

This Feb. 27, 2018, photo shows electronics for use in a quantum computer in the quantum computing lab at the IBM Thomas J. Watson Research Center in Yorktown Heights, N.Y. Describing the inner workings of a quantum computer isn’t easy, even for top scholars. That’s because the machines process information at the scale of elementary particles such as electrons and photons, where different laws of physics apply. (AP Photo/Seth Wenig)

The quantum battle for the Indo-Pacific theater: Intersections of technology and territory

Read more
Getty Images/iStockphoto/djedzuratechnology trends 2024,

Emergency management today: Quantum computing is a 21st century solution for 21st century problems

Read more
Federal News Radio pinwheel icon

Keeping the qubits quiet: DARPA looks at how to build a quantum computer

Read more
Amelia Brust/Federal News Network

White House tells agencies to participate in post-quantum cryptography tests

Read more
Amelia Brust/Federal News Networkcybersecurity

Can the government prevent a grid shutdown from a quantum cyber attack?

Read more
Quantum technology

Quantum computing’s threat to cybersecurity — winter is coming

Agencies need to act now to protect their data from the coming threat of quantum computing

Read more
Iraqi army units are deployed during military operations of the Iraqi Army's Seventh Brigade in Anbar, Iraq, Sunday, Dec. 29, 2019. An Iraqi general said Sunday that security has been beefed up around the Ain al-Asad air base, a sprawling complex in the western Anbar desert that hosts U.S. forces, following a series of attacks. (AP Photo/Nasser Nasser)

Pentagon says military needs to adapt to increasingly hotter world

Also in today’s Federal Newscast, the Biden administration takes action to make sure public research results are available to the public. And the Air Force…

Read more
Federal News Radio pinwheel icon

What’s in the new NIST guidance for encryption, cybersecurity in the quantum era?

The theory is quantum will be so powerful it will easily crack encryption algorithms conventional computers would take thousands of years to crack.

Read more